Don't have an account?

Oracle Magazine: Storage from A to ZFS

Most business users don’t spend time thinking about where their files are stored. They log in to the applications they need, create documents, retrieve information, enter transactions, and periodically hit the Save button. They have been told that if they follow a few simple guidelines, all of their critical information will be saved, backed up, and duplicated behind the scenes. The vast storage infrastructure that automates these activities is largely hidden from view. Read more.

Meizhou Municipal Information Centre provides information services to the municipality of Meizhou, China, which has a population of 5.5 million people. The Information Centre is part of the Bureau of Economy and Information, and serves 1,000 municipal and county government bodies.
The Meizhou Municipal Information Centre’s small staff provides and maintains information services to the city through the government portal site, extranet and data center. The IT staff wanted to avoid downtime and improve backup and recovery. Download whitepaper »

Organizations across the globe are finding disaster recovery increasingly important
for a number of reasons. This white paper explains how virtualization technology can solve the cost vs. time
dilemma traditional data recovery solutions pose, enabling organizations to quickly
and cost effectively recover all server workloads. Download whitepaper »

Managing your data center means more than just keeping your server workloads running; it also means protecting these workloads. After all, servers are costly: You incur physical costs, such as capital, power and cooling costs, as well as software licensing and support costs. If your servers are worth all this expense, they’re worth protecting from unexpected downtime. Download whitepaper »

Top Whitepapers

More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches.
•One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights.
•While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch
•As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential

Featured Whitepapers

The most basic network attacks attempt to overwhelm a defensive device with sheer
volumes of traffic. Sometimes these volumetric attacks are designed to overload the
connections-per-second (CPS) capacity (e.g., the ramp-up rate). Learn how to mitigate DDoS attacks

Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.